Library Logo

Your search returned 774 results. Subscribe to this search

|
1. Computational models of risks to infrastructure

by Skanata, Dejan; Byrd, Daniel M. -- North Atlantic Treaty Organization. Public Diplomacy Division; NATO Science for Peace and Security Programme -- NATO Advanced Research Workshop on Computational Models of Risks to Infrastructure (2006 : Primošten, Croatia).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Amsterdam, Netherlands ; Washington, DC : IOS Press, 2007Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [003.30113 COM] (1).

2. Data networks : routing, security, and performance optimization

by Kenyon, Tony.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Digital Press, c2002Online Access: Publisher description | Table of contents Availability: Items available for loan: Dhaka University Science Library [004.6 KED] (1).

3. Beginning cryptography with Java

by Hook, David.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis, IN : Wiley Pub., 2005Online Access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.133 HOB] (2).

4. Selinux : NSA's open source security enhanced Linux

by McCarty, Bill.

Edition: 1st ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Beijing ; Sebastopol, CA : O'Reilly, c2005Other title: NSA's open source security enhanced Linux.Online Access: Publisher description | Contributor biographical information | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.432 MCS] (3).

5. Software engineering for secure systems : industrial and research perspectives

by Mouratidis, Haralambos.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 MOS] (1).

6. Cyber security, cyber crime and cyber forensics : applications and perspectives

by Santanam, Raghu; Sethumadhavan, M; Virendra, Mohit.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 CYB] (1).

7. Computer security, ESORICS 96 : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings

by Bertino, Elisa. -- (4th : European Symposium on Research in Computer Security 1996 : Rome, Italy).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin ; New York : Springer, 1996Availability: Items available for loan: Dhaka University Science Library [005.8 COM] (2).

8. Security and privacy assurance in advancing technologies : new developments

by Nemati, Hamid R.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Hershey, PA : Information Science Reference, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 SEC] (1).

9. Information security and privacy : First Australian Conference, ACISP '96, Wollongong, NSW, Australia, June 24-26, 1996 : proceedings

by Pieprzyk, Josef; Seberry, Jennifer. -- ACISP '96 (1996 : Wollongong, N.S.W.).

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin ; New York : Springer, c1996Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 INF] (2).

10. Security policies and implementation issues

by Johnson, Rob.

Material type: book Book; Format: electronic available online remote; Literary form: not fiction Publisher: Sudbury, Mass. : Jones & Bartlett Learning, c2011Availability: Items available for loan: Dhaka University Science Library [005.8 JOS] (1).

11. Information security risk analysis

by Peltier, Thomas R.

Edition: 2nd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton : Auerbach Publications, 2005Online Access: Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 PEI] (1).

12. Understanding and applying cryptography and data security

by Elbirt, Adam J.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boca Raton, Fl. : CRC Press, 2009Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.8 ELU] (2).

13. Fundamentals of computer security

by Pieprzyk, Josef.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Berlin : New York : Springer, c2003Online Access: Publisher description | Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.8 PIF] (1).

14. Administering Windows Vista security : the big surprises

by Minasi, Mark; Hynes, Byron; Minasi, Mark.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Indianapolis, IN : Wiley/Sybex, c2007Online Access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 MIA] (1).

15. Outsourcing information security

by Axelrod, C. Warren.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Boston : Artech House, c2004Availability: Items available for loan: Dhaka University Science Library [005.8 AXO] (1).

16. Hacking exposed : network security secrets & solutions

by McClure, Stuart; Scambray, Joel; Kurtz, George.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : McGraw-Hill/Osborne, c2003; New Delhi Tata Mc Graw-Hill 2003Online Access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Dhaka University Science Library [005.8 MCH] (3).

17. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 4th ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2006Online Access: Table of contents only Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (2).

18. Protection and security on the information superhighway

by Cohen, Frederick B.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: New York : Wiley, c1995Online Access: Table of Contents | Contributor biographical information | Publisher description Availability: Items available for loan: Dhaka University Science Library [005.8 COP] (1).

19. Cryptography and network security : principles and practice

by Stallings, William.

Edition: 3rd ed.Material type: book Book; Format: print ; Literary form: not fiction Publisher: Upper Saddle River, N.J. : Prentice Hall, c2003Availability: Items available for loan: Dhaka University Science Library [005.82 STC] (3).

20. UNIX system security : how to protect your data and prevent intruders

by Farrow, Rik.

Material type: book Book; Format: print ; Literary form: not fiction Publisher: Reading, Mass. : Addison-Wesley Pub. Co., c1991Availability: Items available for loan: Dhaka University Science Library [005.8 FAU] (1).

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login